期刊文献+

一种基于串空间的不变集生成算法

A new algorithm for constructing invariant-sets based on strand spaces
下载PDF
导出
摘要 在串空间模型中将理想定义为其不变集的代数结构,并利用它的性质描述攻击者攻击行为的能力界限,将安全协议的形式化分析规约为代数系统的不变集生成.引入hash:K×Bn-1→B,扩充了原模型中的子句关系,并给出理想诚实性判定定理在扩充子句关系下仍成立的结论.在此基础之上,提出诚实性判定条件的可满足性定理和一种新的不变集生成算法. The ideal is defined as an algebraic structure of invariant-sets in a strand space model, where thekey procedure of a formal analysis of security protocols can be regarded as constructing some invariant-sets, i. e. algebras. The bounds on the abilities of the penetrator are described using the properties of ideals. In this paper, we define the mapping hash:K×B^n-1→B and extend the sub-term relations in the original model. We also obtain that the decidable theorem for honesty of ideals still holds as it is described under the extended subterm relations. Finally, the theorem for the satisfiability of decidable conditions of honest ideals and a new al- gorithm for constructing invariant-sets are proposed.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2006年第3期443-446,488,共5页 Journal of Harbin Institute of Technology
关键词 不变集 理想 诚实性 串空间 invariant-sets ideal honesty strand spaces
  • 相关文献

参考文献5

  • 1FABREGA F J T,HERZOG J C,GUTTMAN J D.Strand spaces:Proving security protocols correct[J].J of Computer Security,1999,7(2-3):191-230.
  • 2PAULSON L C.Proving properties of security protocols by induction[A].In 10^th IEEE Computer Security Foundations Workshop[C].Rockport,Massachusetts:IEEE Computer Society Press,1997.70-83.
  • 3孙海波,林东岱.基于单向陷门函数的TMN协议的改进[J].中国科学院研究生院学报,2002,19(3):254-262. 被引量:1
  • 4HARKINS D,CARREL D.The Internet Key Exchange (IKE).RFC2409,1998.Available at http://www.faqs.org/rfcs/rfc2409,html
  • 5MEADOWS C A.Invariant generation techniques in cryptographic protocol analysis[A].Proceedings of 13^th IEEE Computer Security Foundations Workshop[C].Cambridge,England:IEEE Computer Society Press,2000.159-167.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部